Professional Documents
Culture Documents
Virtual
Environment and
Multimedia System
S M TALHA JUBAED
DEPT. OF COMPUTER SCIENCE & ENGINEERING (CSE)
UNIVERSITY OF RAJSHAHI
HOTLINE: + 088- 01911 088 706
Perceptual Invisibility:
The modification caused by the watermarks embedding should not degrade the
perceived image quality. However, even hardly visible differences may become apparent when the
original image is directly compared to the watermarked one.
Trustworthily Detection:
Watermarks should constitute a sufficient and trustworthily part of ownership of a particular product.
Detection of a false alarm should be extremely rare. Watermarks signals should be characterized by
great complexity. This is necessary in order to be able to produce an extensive set of sufficiently well
distinguishable watermarks. An enormous set of watermarks prevents the recovery of a particular
watermark by trial-and-error procedure.
Associated Key:
Watermarks should be associated with an identification number called watermark key. The key is used
to cast, detect and remove a watermark. Subsequently, the key should be private and should exclusively
characterize the legal owner. Any digital signal, extracted from a digital image, is assumed to be a valid
watermark if and only if it is associated to a key using a well established algorithm.
Automated Detection/Search:
Watermarks should combine easily with a search procedure that scans any publicly accessible domain
in a network environment for illegal deposition of an owners product.
Statistical Invisibility:
Watermarks should not be recovered using statistical methods. For example, the possession of a great
number of digital products, watermarked with the same key, should not be disclose the watermark by
applying statistical methods. Therefore, watermarks should be image dependent.
Multiple Watermarking:
We should be able to embed a sufficient number of different watermarks in the same images. This
feature seems necessary because we cannot prevent someone from watermarking an already
watermarked image. It is also convenient when the copyright property is transferred from one owner
to another.
Robustness:
A watermark that is of some practical use should be robust to image modifications up to a certain degree.
The most common image manipulations are compression, filtering, color quantization/color brightness
modifications, geometric distortions and format change. A digital image can undergo a great deal of
different modifications that may deliberately affect the embedded watermark. Obviously, a watermark
that is to be used as a means of copyright protection should be detectable up to the point that the host
image quality remains within acceptable limits.
Question: Write down the Huffman coding algorithm used in lossless compression. Draw the coding tree
for HELLO using the Huffman coding algorithm. 7 Marks CSE-2009 ***
Huffman Coding Algorithm:
1. Initialization: Put all symbols on a list sorted according to their frequency counts.
2. Repeat until the list has only one symbol left:
(a) From the list pick two symbols with the lowest frequency counts. Form a Huffman subtree
that has these two symbols as child nodes and create a parent node.
(b) Assign the sum of the children's frequency counts to the parent and insert it into the list
such that the order is maintained.
(c) Delete the children from the list.
S M TALHA JUBAED
3. Assign a codeword for each leaf based on the path from the root.
Coding Tree for HELLOW using the Huffman Algorithm
Encoder is "learning" the characteristics of the source. The decoder must learn along with the
encoder by continually updating the Huffman tree so as to stay in synchronization with the
encoder.
Another advantage: they require only one pass over the data.
Question: Write down the LZW compression algorithm and generate the output code for the string
CSERURUCSE. The initial dictionary is C-1, S-2, E-3, R-4, U-5. What are the limitations of the LZW
compression? 6 Marks CSE-2012 ***
LZW Compression Algorithm:
Second Part:
Let's start with a very simple dictionary (also referred to as a "string table"), initially containing only 3
characters, with codes as follows:
Code
string
------------------------------------------1
C
2
S
3
E
4
R
5
U
Now if the input string is CSERURUCSE, the LZW compression algorithm works as follows:
S
C
OUTPUT
CODE
STRING
---------------------------------------------------------------------------------------1
C
2
S
3
E
4
R
5
U
S M TALHA JUBAED
---------------------------------------------------------------------------------------C
S
1
6
CS
S
E
2
7
SE
E
R
3
8
ER
R
U
4
9
RU
U
R
5
10
UR
R
U
RU
C
9
11
RUC
C
S
CS
E
6
12
CSE
E
EOF 5
----------------------------------------------------------------------------------------The output codes are 1 2 3 4 5 9 6 5.
Similar Important Question: Generate the output code for the string ABABBABCABABBA. The initial
dictionary is A-1, B-2, C-3.
Let's start with a very simple dictionary (also referred to as a "string table"), initially containing only 3
characters, with codes as follows:
Code
string
------------------------------------------1
C
2
S
3
E
4
R
5
U
Now if the input string is ABABBABCABABBA, the LZW compression algorithm works as follows:
Second Part: The discrete cosine transform (DCM), a widely used transform coding technique, is able to
perform decorrelation of the input signal in a data-independent manner. Because of this, it has gained
tremendous popularity. The DCT is a close counterpart to the Discrete Fourier Transform (DFT). DCT is
likely a transform that involves only the real part of the DFT.
Question: Is DCT is a part of DFT? Justify the answer. 2 Marks CSE-2012 ***
Question: Write down the properties of Huffman coding with example. 3 Marks CSE-2012 ***
Properties of Huffman coding:
The following are important properties of Huffman Coding:
1. Unique Prefix Property: No Huffman code is a prefix of any other Huffman code -precludes any
ambiguity in decoding.
2. Optimality: The Huffman code is a minimum redundancy code. It has been proved optimal for a
given data model (i.e., a given, accurate, probability distribution):
The two least frequent symbols will have the same length for their Huffman codes, differing
only at the last bit.
Symbols that occur more frequently will have shorter Huffman codes than symbols that occur
less frequently.
The average code length for an information source S is strictly less than + 1. Combined with
we have:
Eq. ( ),
< + 1
Question: What is the entropy of an information source with alphabet = {, , . } ? 2 Marks
CSE-2012 ***
Entropy of an Information source:
The entropy of an information source with alphabet = {, , . }is:
S M TALHA JUBAED
The term indicates the amount of information contained in , which corresponds to the number
S M TALHA JUBAED
Question: Write short notes on the following topics: Progressive JPEG CSE-2011
Progressive JPEG:
The JPEG standard supports numerous modes (variations). Some of the commonly used ones are:
1.
2.
3.
4.
Sequential Mode
Progressive Mode
Hierarchical Mode
Lossless Mode
Progressive JPEG delivers low quality versions of the image quickly, followed by higher quality passes
and has become widely supported in web browsers. Such multiple scan of images are of course useful
when the speed of the communication line is low. In progressive mode, the first few scans carry only a
few bits and deliver a rough picture of what is to follow. After each additional scan, more data is received
and image quality is gradually enhanced. The advantage is that the user-end has a choice whether to
continue receiving image data after the first scan.
Progressive JPEG can be realized in one of the following two ways:
1. Spectral selection: This scheme takes advantage of the "spectral" (spatial frequency spectrum)
characteristics of the DCT coefficients: higher AC components provide detail information.
Scan 1: Encode DC and first few AC components, e.g., AC1, AC2.
Scan 2: Encode a few more AC components, e.g., AC3,AC4, AC5.
.
.
.
Scan k: Encode the last few ACs, e.g, AC61,AC62, AC63.
2. Successive approximation: Instead of gradually encoding spectral bands, all DCT coefficients are
encoded simultaneously but with their most significant bits (MSBs) first.
Scan 1: Encode the first few MSBs, e.g., Bits 7, 6, 5, 4.
Scan 2: Encode a few more less significant bits, e.g., Bit 3.
.
.
.
Scan m: Encode the least significant bit (LSB), Bit 0.
Question: Briefly discuss the parameters measured in Quality of services for multimedia data
transmission. 4 Marks CSE-2011 CSE-2009 ***
Parameters measured in Quality of services for multimedia data transmission:
Quality of Service (QoS) for multimedia data transmission depends on many parameters. Some of the
most important are:
Data rate: A measure of transmission speed, often measured in kbps or Mbps.
Latency (maximum frame/packet delay): maximum time needed from transmission to reception,
often measured in milliseconds(msec).
For example, when the round-trip delay exceeds 50 msec, echo becomes a noticeable problem;
when the one way delay is longer than 250 msec, talker overlap will occur, since each talker will
talk without knowing the other is also talking.
Packet loss or error: A measure (in percentage) of error rate of the packetized data transmission.
Packets get lost or garbled, such as over the internet. They may also be delivered late or in the
S M TALHA JUBAED
wrong order. Since retransmission is often undesirable, a simple error-recovery method for realtime multimedia is to replay the last packet hoping the error is not noticeable.
In general, for uncompressed audio/video, packet loss is < 102 . For compressed multimedia
and ordinary data, the desirable packet loss is less than 107 108 .
Jitter (or delay jitter): A measure of smoothness of the audio/video playback. Technically, jitter
is related to the variance of frame/packet delays. A large buffer (jitter buffer) can to hold enough
frames to allow the frame with the longest delay to arrive, to reduce playback jitter. However,
this increases the latency and may not be desirable in real-time and interactive applications.
Sync skew: A measure of multimedia data synchronization, often measured in milliseconds
(msec). For a good lip synchronization, the limit of the sync skew is 80 between audio
and video. In general 200 is still acceptable.
Question: When Real Time Streaming Protocol (RTSP) is used? Briefly discuss its operation. 4 Marks CSE2009 ***
When Real Time Streaming Protocol (RTSP) is used:
Streaming Audio and Video are Audio and video data that are transmitted from a stored media server to
the client in a data stream that is almost instantly decoded. (
)
The operations of Real Time Streaming Protocol (RTSP):
RTSP is for communication between a client and a stored media server. Fig. 16.5 illustrates a possible
scenario of four RTSP operations:
1. Requesting presentation description: the client issues a DESCRIBE request to the Stored Media
Server to obtain the presentation description such as media types (audio, video, graphics etc),
frame rate, resolution, codec, etc. from the server.
2. Session setup: the client issues a SETUP to inform the server of the destination IP address, port
number, protocols, TTL (for multicast). The session is set up when the server returns a session
ID.
3. Requesting and receiving media: after receiving a PLAY, the server started to transmit streaming
audio/video data using RTP. It is followed by a RECORD or PAUSE. Other VCR commands, such
as FAST-FORWARD and REWIND are also supported. During the session, the client periodically
sends an RTCP packet to the server, to provide feedback information about the QoS received.
4. Session closure: TEARDOWN closes the session.
S M TALHA JUBAED
S M TALHA JUBAED
S M TALHA JUBAED
Channel messages:
A Channel message can have up to 3 bytes: The first byte is the status byte (the opcode, as it
were); has its most significant bit set to 1.
The 4 low-order bits identify which channel this message belongs to (for 16 possible channels).
The 3 remaining bits hold the message. For a data byte, the most significant bit is set to 0.
Voice messages:
This type of channel message controls a voice, i.e., sends information specifying which note to
play or to turn off, and encodes key pressure.
Voice messages are also used to specify controller effects such as sustain, vibrato, tremolo, and
the pitch wheel. Table 6.3 lists these operations.
System Messages:
S M TALHA JUBAED
System messages have no channel number and are meant for commands that are not channel
specific, such as timing signals for synchronization, positioning information in prerecorded MIDI
sequences, and detailed setup information for the destination device.
Opcodes for all system messages start with &HF.
System messages are divided into three classifications, according to their use:
1. System common messages
2. System real-time messages
3. System exclusive messages
System Common Message: Table 6.5 sets out these messages, which relate to timing or positioning..
Question: Define Multimedia System. What are the desirable features of a multimedia system? 5 Marks
CSE-2012 CSE-2011 CSE-2010 ***
Multimedia System:
A Multimedia System is a system capable of processing multimedia data and
applications. A Multimedia System is characterised by the processing, storage, generation, manipulation
and rendition of Multimedia information.
Characteristics of a Multimedia System
A Multimedia system has four basic characteristics:
S M TALHA JUBAED
1.
2.
3.
4.
S M TALHA JUBAED